Sciweavers

660 search results - page 122 / 132
» Performance Specifications and Metrics for Adaptive Real-Tim...
Sort
View
ICST
2009
IEEE
14 years 2 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
DEXA
2007
Springer
173views Database» more  DEXA 2007»
14 years 1 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
ICNP
2005
IEEE
14 years 1 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
LREC
2010
143views Education» more  LREC 2010»
13 years 9 months ago
Determining the Origin and Structure of Person Names
This paper presents a novel system HENNA (Hybrid Person Name Analyzer) for identifying language origin and analyzing linguistic structures of person names. We conduct ME-based cla...
Yu Fu, Feiyu Xu, Hans Uszkoreit
ECIS
2001
13 years 9 months ago
Modelling IS successions in e commerce
The paper considers the conditions governing the diffusion and development of e-commerce. The analysis builds on earlier discussions of technological successions and explores a nu...
Paul Windrum, Chris Birchenhall, Ray Hackney